1 COMPUTER, INTERNET, & USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter School makes available to our workforce and students access to one or more forms of electronic media and services, including computers, e mail, telephones, voic , fax machines,smartboards, wire services, online services, intranet, Internet and the World Wide Web. B. Jersey City Global Charter School encourages the use of these media and associated services because they can make communication more efficient and effective and because they are valuable sources of information about education, students, technology, and new products and services. However, all employees and everyone connected with the organization should remember that electronic media and services provided by the company are company property and their purpose is to facilitate and support company business. All computer users have the responsibility to use these resources in a professional, ethical, and lawful manner. C. To ensure that all employees are responsible, the following guidelines have been established for using and maintaining Chromebooks, e mail and the Internet. No policy can lay down rules to cover every possible situation. Instead, it is designed to express Jersey City Global Charter School s philosophy and set forth general principles when using electronic hardware, media, and services. SECTION TWO. PROHIBITED COMMUNICATIONS Electronic media cannot be used for knowingly transmitting, retrieving, or storing any communication, including but not limited to Jersey City Global Charter School s website, Youtube video postings by members of the Jersey City Global Charter School s community(to include, but not limited to Administration, Staff, Secondary Agent Employees, Individuals representing contracted organizations, Students, and Parents of Students)that is: 1. Discriminatory or harassing; 2. Derogatory to any individual or group; 3. Obscene, sexually explicit or pornographic; 4. Defamatory or threatening; 5. In violation of any license governing the use of software; or 6. Engaged in for any purpose that is illegal or contrary to Jersey City Global Charter School s policy or business interests.
2 SECTION THREE. STUDENT RESPONSIBILITY AND USEAGE POLICY Students will be issued individual Chromebooks during regular school hours that remain the property of Jersey City Global Charter School. Students will receive instruction on computer edicate and the necessary skills to use their computer. However it must be understood that while teachers will make a concerted effort to prevent damage to the equipment, accidents will happen. Unintentional damage to computers by students or staff is defensible, however malicious or intentional damage is and will be punishable by a fine to equal the amount of the original purchase price of the Chromebook. PARENT SIGNATURE DATE PERSONAL USE The computers, electronic media and services provided by Jersey City Global Charter School are primarily for business use to assist employees in the performance of their jobs. Limited, occasional, or incidental use of electronic media (sending or receiving) for personal, nonbusiness purposes is understandable and acceptable, and all such use should be done in a manner that does not negatively affect the systems' use for their business purposes. However, employees are expected to demonstrate a sense of responsibility and not abuse this privilege. Caring for your Chromebooks is of the utmost importance. Respecting the property of Jersey City Global Charter School should be a priority. With this in mind Jersey City Global Charter School has provided padded computer cases for the Chromebooks. Employees who are given take home Chromebooks are expected to use these bags at all times. This policy is used as a preventative measure to avoid any unecessary damage to the Chromebooks. Any violation of this policy will result in the forfeiture of the employees right to continue useage of the Chromebook, and any damage caused which warrants repair or replacement will be the financial responsibility of the employee of Jersey City Global Charter School. INITIAL SECTION FOUR. ACCESS TO EMPLOYEE COMMUNICATIONS A. Generally, electronic information created and/or communicated by an employee using e mail, word processing, utility programs, spreadsheets, voic , telephones, Internet and bulletin board system access, and similar electronic media is not reviewed by the company. However, the following conditions should be noted: Jersey City Global Charter School does not routinely gather logs for most electronic activities or monitor employee communications directly, e.g. recording telephone calls, telephone numbers dialed, sites accessed, call length,
3 and time at which calls are made. However internet usage is monitored for the following purposes: 1. Cost analysis; 2. Resource allocation; 3. Optimum technical management of information resources; and 4. Detecting patterns of use that indicate employees are violating company policies or engaging in illegal activity. 5. Other training purposes B. Jersey City Global Charter School reserves the right, at its discretion, to review any employee's electronic files and messages to the extent necessary to ensure electronic media and services are being used in compliance with the law, this policy and other company policies. C. Employees should not assume electronic communications are completely private. Accordingly, if they have sensitive information to transmit, they should use other means. SECTION FIVE. SOFTWARE To prevent computer viruses from being transmitted through the company's computer system, unauthorized downloading of any unauthorized software is strictly prohibited. Including, but not limited to instant message and remote control programs. Only software registered and/or approved through Jersey City Global Charter School may be downloaded. Employees should contact the system administrator if they have any questions. SECTION SIX. SECURITY/APPROPRIATE USE A. Employees must respect the confidentiality of other individuals' electronic communications. Except in cases in which explicit authorization has been granted by company management, employees are prohibited from engaging in, or attempting to engage in: 1. Monitoring or intercepting the files or electronic communications of other employees or third parties; 2. Hacking or obtaining access to systems or accounts they are not authorized to use; 3. Using other people's log ins or passwords; and 4. Breaching, testing, or monitoring computer or network security measures. B. No e mail or other electronic communications can be sent that attempt to hide the identity of the sender or represent the sender as someone else. C. Electronic media and services should not be used in a manner that is likely to cause network congestion or significantly hamper the ability of other people to access and use the system. D. Anyone obtaining electronic assess to other companies' or individuals' materials must respect all copyrights and cannot copy, retrieve, modify or forward copyrighted materials except as permitted by the copyright owner.
4 SECTION SEVEN. ENCRYPTION Employees can use encryption software supplied to them by the systems administrator for purposes of safeguarding sensitive or confidential business information. supervisor with a sealed hard copy record (to be retained in a secure location) of all of the passwords and/or encryption keys necessary to access the files. SECTION EIGHT. PARTICIPATION IN ONLINE FORUMS A. Employees should remember that any messages or information sent on company provided facilities to one or more individuals via an electronic network for example, Internet mailing lists, bulletin boards, and online services are statements identifiable and attributable to Jersey City Global Charter School. B. Jersey City Global Charter School recognizes that participation in some forums might be important to the performance of an employee's job. For instance, an employee might find the answer to a technical problem by consulting members of a news group devoted to the technical area. SECTION NINE. VIOLATIONS Any employee who abuses the privilege of their access to Chromebooks, Smartboards, e mail or the Internet in violation of this policy will be subject to corrective action, including possible termination of employment, legal action, and criminal liability. SECTION TEN. EMPLOYEE AGREEMENT ON USE OF E MAIL AND THE INTERNET I have read, understand, and agree to comply with the foregoing policies, rules, and conditions governing the use of the Company's computer and telecommunications equipment and services. I understand that I have no expectation of privacy when I use any of the telecommunication equipment or services. I am aware that violations of this guideline on appropriate use of the e mail and Internet systems may subject me to disciplinary action, including termination from employment, legal action and criminal liability. I further understand that my use of the
5 e mail and Internet may reflect on the image of Jersey City Global Charter School to our customers, competitors and suppliers and that I have responsibility to maintain a positive representation of the company. Furthermore, I understand that this policy can be amended at any time. Dated:. [Signature of employee/parent] [Printed name of employee/parent] Computer ID
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
Information Technology Policies and Procedures Wakulla County School District March 2014 Table of contents TABLE OF CONTENTS... 1 1.0 OVERVIEW... 2 2.0 PURPOSE... 2 3.0 SCOPE... 2 4.0 ACCEPTABLE USE POLICY...
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
NORTHWEST OHIO COMPUTER ASSOCIATION PROGRAM OF THE NORTHERN BUCKEYE EDUCATION COUNCIL NETWORK MANAGEMENT SECURITY POLICY The Board of Directors and staff of the Northwest Ohio Computer Association Program
Internet & Cell Phone Usage Policy The Internet usage Policy applies to all Internet & Cell phone users (individuals working for the company, including permanent full-time and part-time employees, contract
Jefferson County School District Information Technology Policies and Procedures 575 S. Water Street Monticello, FL 32344 (850) 342-0100 www.jeffersonschooldistrict.org June 2014 Table of Contents 1.0 Overview...
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Policy 634 Education Programs Electronic Technologies Acceptable Use I. Purpose This policy sets forth policies, parameters and guidelines for access to the district s electronic technologies, use of personal
Bringing Your Acceptable Use Policy Up to 2013 Standards Bringing Your Acceptable Use Policy Up to 2013 Standards Organizations of all sizes rely on their employees to be good stewards of company time,
HIPAA Security Risk Analysis Toolkit In January of 2013, the Department of Health and Human Services Office for Civil Rights (OCR) released a final rule implementing a wide range of HIPAA privacy and security
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
St. Johns River State College 3.11 Technology 3.11.1 Account Management Computer accounts are the means used to grant access to SJR STATE Information Resources. These accounts provide a means of providing
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
The Archbishop s Seminary Information Security Policy 1 Contents PURPOSE... 4 SCOPE... 4 POLICY STATEMENTS... 5 INFORMATION SECURITY POLICY... 5 THE SCHOOL S RIGHT TO ACCESS ITS PROPERTY... 5 THE SCHOOL
Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Business Acceptable Use Policy Policy Introduction The following are policies ( these Policies ) for use of Internet access service that is provided by Mediacom to or through any customer under a contract,
Delgado Community College Information Technology Security Policy Approved: *November 5, 2010 ) Delgado Community College IT Security Policy Page 2 *November 5, 2010 Table of Contents Title Page 1.0 Introduction
END USER LICENSE AGREEMENT, NOTICE AND HIPAA BUSINESS ASSOCIATE AGREEMENT This End User License Agreement, Notice of Privacy Practices and HIPAA Business Associate Agreement (this "Agreement ) are by and
NETWORK SECURITY POLICY 1. GENERAL Henry County Board of Education (Board) provides employees appropriate electronic access, consisting of e- mail communication, network connectivity, student information
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
INFORMATION TECHNOLOGY User Standards and Guidelines Manual May 2010 Division of Information Technology http://www.palmbeachschools.org/it/security.asp Table of Contents 1. Introduction... 4 2. Definitions...
Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.